Cisco ASA Audit Event: 322002

322002: ARP inspection check failed for request or response received from a host advertising an IP address that is statically or dynamically bound to another MAC address

Cisco ASA is a security device that provides the combined capabilities of a firewall, an antivirus, and an intrusion prevention system. It also facilitates virtual private network (VPN) connections. It helps to detect threats and stop attacks before they spread through the network.

Message: %ASA-3-322002: ARP inspection check failed for arp {request|response} received from host MAC_address on interface interface. This host is advertising MAC Address MAC_address_1 for IP Address IP_address, which is {statically|dynamically} bound to MAC Address MAC_address_2.

Event 322002 is generated when the ARP inspection module, which when enabled, checks whether a new ARP entry advertised in the packet conforms to the statically configured or dynamically learned IP-MAC address binding. It then forwards the packets across the ASA, and drops them if the check fails.

How could you resolve this situation?

If the cause is an attack, you can deny the host using the ACLs. If the cause is an invalid configuration, correct the binding.

Cisco ASA Auditing Tool

EventLog Analyzer is a comprehensive log management software with which you can centrally collect, analyze, and manage logs from all the different log sources in your network. You also get reports and alerts on your network security, making it a power-packed IT security tool.